Tech Reports in Computer Science and Engineering: Recent submissions

Once a computer system has been infected with malware, restoring it to an uninfected state often requires costly service-interrupting actions such as rolling back to a stable snapshot or reimaging the system entirely. We ...

"Given a choice between dancing pigs and security, users will pick dancing pigs every time," warns an oft-cited quote from well-known security researcher Bruce Schneier. This issue of understanding how to make security ...

Machine learning techniques for defect and vulnerability detection have
the potential to quickly direct developers' attention to software
components with faulty implementations. Effective application of such
defect ...

Fixed points of recurrent neural networks can represent many things, including stored memories, solutions to optimization problems, and waypoints along non-fixed attractors. As such, they are relevant to a number of ...